Hi,
I do have OpenSER 1.1.0 with TLS support on Debian Sarge working nicely, and my SNOM 360 registers against it nicely. When using OpenSER 1.2 (2 days old CVS build) with TLS on Debian Etch with SNOM 360 and own signed certificates (with tls/tools & own machine names) I get debug info (below) from OpenSER. Any ideas with that "peer did not send sertificate" ?
Thank you so many times, -Mika
--- clip --- Feb 2 13:15:10 localhost openser[20855]: tcp_receive_timeout: 0xb59e1900 expired (296, 297) lt=0 Feb 2 13:15:10 localhost openser[20855]: DBG: io_watch_del (0x8122980, 18, -1, 0x10) fd_no=2 called Feb 2 13:15:10 localhost openser[20855]: releasing con 0xb59e1900, state 0, fd=18, id=2 Feb 2 13:15:10 localhost openser[20855]: extra_data (nil) Feb 2 13:15:10 localhost openser[20859]: handle_tcp_child: reader response= b59e1900, 0 from 0 Feb 2 13:15:10 localhost openser[20859]: DBG: io_watch_add(0x8122820, 23, 2, 0xb59e1900), fd_no=15 Feb 2 13:15:10 localhost openser[20859]: handle_tcp_child: CONN_RELEASE 0xb59e1900 refcnt= 0 Feb 2 13:15:10 localhost openser[20859]: tcpconn_new: new tcp connection to: 193.65.183.233 Feb 2 13:15:10 localhost openser[20859]: tcpconn_new: on port 2063, type 3 Feb 2 13:15:10 localhost openser[20859]: tls_tcpconn_init: Entered: Creating a whole new ssl connection Feb 2 13:15:10 localhost openser[20859]: tls_tcpconn_init: Looking up socket based TLS server domain [193.65.183.13:5061] Feb 2 13:15:10 localhost openser[20859]: tls_find_server_domain: virtual TLS server domain not found, Using default TLS server domain settings Feb 2 13:15:10 localhost openser[20859]: tls_tcpconn_init: Found socket based TLS server domain [0.0.0.0:0] Feb 2 13:15:10 localhost openser[20859]: tls_tcpconn_init: Setting in ACCEPT mode (server) Feb 2 13:15:10 localhost openser[20859]: tcpconn_add: hashes: 462, 9 Feb 2 13:15:10 localhost openser[20859]: handle_new_connect: new connection: 0xb5a06c88 24 flags: 0002 Feb 2 13:15:10 localhost openser[20859]: send2child: to tcp child 0 6(20855), 0xb5a06c88 Feb 2 13:15:10 localhost openser[20855]: received n=4 con=0xb5a06c88, fd=18 Feb 2 13:15:10 localhost openser[20855]: DBG: io_watch_add(0x8122980, 18, 2, 0xb5a06c88), fd_no=1 Feb 2 13:15:11 localhost openser[20855]: tls_update_fd: New fd is 18 Feb 2 13:15:11 localhost openser[20855]: tls_update_fd: New fd is 18 Feb 2 13:15:11 localhost openser[20855]: tls_accept: Error in SSL: Feb 2 13:15:11 localhost openser[20855]: tls_error: error:140890C7:SSL routines:SSL3_GET_CLIENT_CERTIFICATE:peer did not return a certificate Feb 2 13:15:11 localhost openser[20855]: DBG: io_watch_del (0x8122980, 18, -1, 0x10) fd_no=2 called Feb 2 13:15:11 localhost openser[20855]: releasing con 0xb5a06c88, state -2, fd=18, id=9 Feb 2 13:15:11 localhost openser[20855]: extra_data 0xb59f1a18 Feb 2 13:15:11 localhost openser[20859]: handle_tcp_child: reader response= b5a06c88, -2 from 0 Feb 2 13:15:11 localhost openser[20859]: tcpconn_destroy: destroying connection 0xb5a06c88, flags 0002 Feb 2 13:15:11 localhost openser[20859]: tls_close: Closing SSL connection Feb 2 13:15:11 localhost openser[20859]: tls_update_fd: New fd is 24 Feb 2 13:15:11 localhost openser[20859]: tls_shutdown: Shutdown successful Feb 2 13:15:11 localhost openser[20859]: tls_tcpconn_clean: Entered
-- clip ---